Supercharge Your Innovation With Domain-Expert AI Agents!

Enciphering method

A ciphertext and key technology, applied in the field of data processing, can solve the problem of insecure plaintext/ciphertext attack, etc.

Inactive Publication Date: 2010-10-27
CISCO TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, insecure against chosen plaintext / ciphertext attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enciphering method
  • Enciphering method
  • Enciphering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] A method and apparatus for encryption are described. In the following description, for purposes of explanation, numerous specific details are given in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In addition, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.

[0030] Embodiments are described here according to the following outline:

[0031] 1.0 Overview

[0032] 2.0 Conceptual Model and Goals

[0033] 3.0 Extended Codebook (XCB) mode for operations on block ciphers

[0034] 3.1 Operation principle

[0035] 3.2 Application examples

[0036] 3.3 Safety Proof

[0037] 3.4 Some differences with existing methods

[0038] 4.0 Implementation Mechanism - Hardware Overview

[0039] 5.0 Extensions and Replacements

[0040...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A block cipher mode of operation implements a block cipher with an arbitrary block length and provides output ciphertext that is always the same size as the input plaintext. The mode can provide the best possible security in systems that cannot allow data expansion, such as disk-block encryption and some network protocols. The mode accepts an additional input, which can be used to protect againstattacks that manipulate the ciphertext by rearranging the ciphertext blocks. The universal hash function from Galois / Counter Mode of operation for block ciphers may be used in an embodiment for hardware and software efficiency.

Description

technical field [0001] The present invention generally relates to data processing. More specifically, the present invention relates to computer-implemented cryptography. Background technique [0002] The approaches described in this section can be implemented, but are not necessarily approaches previously conceived or implemented. Therefore, unless otherwise indicated herein, the approaches described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section. [0003] If the ciphertext has exactly the same number of bits as the plaintext, the encryption method is length-preserving. Such a method must be deterministic, since it is impossible to accommodate random data (such as an initialization vector) within the ciphertext. In addition, deterministic length-preserving encryption is also suitable for some applications. For example, in some encrypted database applications, determinism is essential t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/28H04L9/32
CPCH04L9/0637H04L9/002H04L2209/12H04L2209/20
Inventor 大卫·A·麦格鲁斯科特·弗吕尔
Owner CISCO TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More